{"version":"1.0","provider_name":"Tilleke &amp; Gibbins","provider_url":"https:\/\/www.tilleke.com","author_name":"Joel Akins","author_url":"https:\/\/www.tilleke.com\/author\/joel\/","title":"Developments in IP Enforcement: Tracing the Identity of Online Infringers in Thailand - Tilleke &amp; Gibbins","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"fPir6mEPV6\"><a href=\"https:\/\/www.tilleke.com\/insights\/developments-in-ip-enforcement-tracing-the-identity-of-online-infringers-in-thailand\">Developments in IP Enforcement: Tracing the Identity of Online Infringers in Thailand<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.tilleke.com\/insights\/developments-in-ip-enforcement-tracing-the-identity-of-online-infringers-in-thailand\/embed\/#?secret=fPir6mEPV6\" width=\"600\" height=\"338\" title=\"&#8220;Developments in IP Enforcement: Tracing the Identity of Online Infringers in Thailand&#8221; &#8212; Tilleke &amp; Gibbins\" data-secret=\"fPir6mEPV6\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","description":"With the emergence of online marketplaces and e-commerce platforms, consumers have transformed their ways of engaging in transactions, gaining unprecedented convenience and access to a vast array of products. These platforms allow small businesses and individual entrepreneurs to reach a wider audience in an increasingly competitive market. Challenges in Tracing Online Infringers The growth of these online marketplaces and e-commerce platforms has also given rise to challenges, particularly in locating the actual identity of online infringers and combating intellectual property infringement activities. Online infringers often take advantage of anonymity to offer counterfeit products for sale on their platforms. Not only do these online infringing activities violate the rights of IP owners, but they also involve the sale of counterfeit products that are often manufactured with inferior quality and may pose significant risks to consumers&#8217; health and safety. In today&#8217;s modern world, tracing the actual identity of online infringers proves challenging,"}